Horror stories abound of electronic lives compromised by stolen passwords. One of the problems with a password-secured life is that the password is the single element that -- when compromised -- allows access. The User ID isn't protected, nor is any hardware. Shouldn't there be better methods?



Source: http://ectnews.com.feedsportal.com/c/34520/f/632000/s/249e1409/l/0L0Stechnewsworld0N0Crsstory0C764230Bhtml/story01.htm
INTERNATIONAL GAME TECHNOLOGY INTERNATIONAL BUSINESS MACHINES (IBM) INTERDIGITAL COMMUNICATIONS INTEL INSIGHT ENTERPRISES
Nessun commento:
Posta un commento